Get Full Version of the Exam
A network administrator wants to implement a method of securing internal routing. Which of the following should the administrator implement?
Ann, an employee in the payroll department, has contacted the help desk citing multiple issues with her device, including:
Word documents, PDFs, and images no longer opening A pop-up
Ann states the issues began after she opened an invoice that a vendor emailed to her. Upon opening the invoice, she had to click several security warnings to view it in her word processor. With which of the following is the device MOST likely infected?
An actor downloads and runs a program against a corporate login page. The program imports a list of usernames and passwords, looking for a successful attempt. Which of the following terms BEST describes the actor in this situation?
A company has three divisions, each with its own networks and services. The company decides to make its secure web portal accessible to all employees utilizing their existing usernames and passwords. The security administrator has elected to use SAML to support authentication. In this scenario, which of the following will occur when users try to authenticate to the portal? (Select two.)
The portal will function as a service provider and request an authentication assertion.
The portal will function as an identity provider and issue an authentication assertion.
The portal will request an authentication ticket from each network that is transitively trusted.
The back-end networks will function as an identity provider and issue an authentication assertion.
The back-end networks will request authentication tickets from the portal, which will act as the third-party service provider authentication store.
The back-end networks will verify the assertion token issued by the portal functioning as the identity provider.
A high-security defense installation recently begun utilizing large guard dogs that bark very loudly and excitedly at the slightest provocation. Which of the following types of controls does this BEST describe?
Select the appropriate attack from each drop down list to label the corresponding illustrated attack.
Attacks may only be used once, and will disappear from drop down list if selected. When you have completed the simulation, please select the Done button to submit.
Which of the following security controls does an iris scanner provide?
A network administrator at a small office wants to simplify the configuration of mobile clients connecting to an encrypted wireless network. Which of the following should be implemented in the administrator does not want to provide the wireless password or he certificate to the employees?
A. WPS B. 802.1x
A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the network shares to which the user had access. The virus was not deleted or blocked by the company#39;s email filter, website filter, or antivirus. Which of the following describes what occurred?
The user#39;s account was over-privileged.
Improper error handling triggered a false negative in all three controls.
The email originated from a private email server with no malware protection.
The virus was a zero-day attack.
Which of the following would a security specialist be able to determine upon examination of a server#39;s certificate?
CA public key
Server private key